Analysis
-
max time kernel
50s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 19:21
Static task
static1
Behavioral task
behavioral1
Sample
64aa9e753e4a2a0d36e4990008463c06540a617d554e812e2e9007991f04071b.exe
Resource
win10-20230220-en
General
-
Target
64aa9e753e4a2a0d36e4990008463c06540a617d554e812e2e9007991f04071b.exe
-
Size
696KB
-
MD5
3d820357aa71dda3a8b9b5f88bcf7c53
-
SHA1
8349875b68ea959ef7c9e3bb3a2a4fdb5b81e074
-
SHA256
64aa9e753e4a2a0d36e4990008463c06540a617d554e812e2e9007991f04071b
-
SHA512
5f42f5fd0bb57b4cb47f6e2a9ae340965dd1062b0997f6da2da324d866c0be85eda91d5394fb071778b2f388b33647a77a2f4c7356ec67d64197e1feafa18506
-
SSDEEP
12288:vMr7y90lr+NbxmbilQjSwBFTy0jitrBKJs3Cz423Jspl5RorBJHFdwG8yz:AyQAcjPetpu4qGpWHFc4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1651.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/2780-178-0x0000000002280000-0x00000000022C6000-memory.dmp family_redline behavioral1/memory/2780-179-0x0000000002580000-0x00000000025C4000-memory.dmp family_redline behavioral1/memory/2780-180-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-181-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-183-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-185-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-187-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-190-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-193-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-196-0x00000000021A0000-0x00000000021B0000-memory.dmp family_redline behavioral1/memory/2780-197-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-199-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-201-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-203-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-205-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-207-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-209-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-211-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-213-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-215-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-217-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/2780-1097-0x00000000021A0000-0x00000000021B0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2436 un396261.exe 2520 pro1651.exe 2780 qu0345.exe 4160 si591015.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1651.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 64aa9e753e4a2a0d36e4990008463c06540a617d554e812e2e9007991f04071b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 64aa9e753e4a2a0d36e4990008463c06540a617d554e812e2e9007991f04071b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un396261.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un396261.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2520 pro1651.exe 2520 pro1651.exe 2780 qu0345.exe 2780 qu0345.exe 4160 si591015.exe 4160 si591015.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2520 pro1651.exe Token: SeDebugPrivilege 2780 qu0345.exe Token: SeDebugPrivilege 4160 si591015.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2436 1444 64aa9e753e4a2a0d36e4990008463c06540a617d554e812e2e9007991f04071b.exe 66 PID 1444 wrote to memory of 2436 1444 64aa9e753e4a2a0d36e4990008463c06540a617d554e812e2e9007991f04071b.exe 66 PID 1444 wrote to memory of 2436 1444 64aa9e753e4a2a0d36e4990008463c06540a617d554e812e2e9007991f04071b.exe 66 PID 2436 wrote to memory of 2520 2436 un396261.exe 67 PID 2436 wrote to memory of 2520 2436 un396261.exe 67 PID 2436 wrote to memory of 2520 2436 un396261.exe 67 PID 2436 wrote to memory of 2780 2436 un396261.exe 68 PID 2436 wrote to memory of 2780 2436 un396261.exe 68 PID 2436 wrote to memory of 2780 2436 un396261.exe 68 PID 1444 wrote to memory of 4160 1444 64aa9e753e4a2a0d36e4990008463c06540a617d554e812e2e9007991f04071b.exe 70 PID 1444 wrote to memory of 4160 1444 64aa9e753e4a2a0d36e4990008463c06540a617d554e812e2e9007991f04071b.exe 70 PID 1444 wrote to memory of 4160 1444 64aa9e753e4a2a0d36e4990008463c06540a617d554e812e2e9007991f04071b.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\64aa9e753e4a2a0d36e4990008463c06540a617d554e812e2e9007991f04071b.exe"C:\Users\Admin\AppData\Local\Temp\64aa9e753e4a2a0d36e4990008463c06540a617d554e812e2e9007991f04071b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un396261.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un396261.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1651.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1651.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0345.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0345.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si591015.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si591015.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5142f567d3c9814d0753fc702f98943ad
SHA13b97f6126436837e4199f0ea69dc540a2979a9d4
SHA256eae679226db5e0b8d769bba09910a03923ed960d15678a2eadc7fb49e9c77ce3
SHA512ed35e9196c0aad3ad399493cdf90894da44d605635c6b6429e785368db9ab521ae2da727781a66f83c7565f47a840ff8971229b6cbda5a8f734138c1930ca854
-
Filesize
175KB
MD5142f567d3c9814d0753fc702f98943ad
SHA13b97f6126436837e4199f0ea69dc540a2979a9d4
SHA256eae679226db5e0b8d769bba09910a03923ed960d15678a2eadc7fb49e9c77ce3
SHA512ed35e9196c0aad3ad399493cdf90894da44d605635c6b6429e785368db9ab521ae2da727781a66f83c7565f47a840ff8971229b6cbda5a8f734138c1930ca854
-
Filesize
553KB
MD546ebcdaba18af4c68020621560d65e44
SHA14c30f34b5ea6941e563e11b70a030741bd822e72
SHA25630440a9803baf77a8234b4a4f97599917dbbd35904795df427d49a28038356a5
SHA512946ae202472684408900f043130f65f5844a998f5675e71ad45b0d5c84a2d52d92d1748e8af741601768f93cd10ebc8e7b2de34593aaf95352991a5c00a96248
-
Filesize
553KB
MD546ebcdaba18af4c68020621560d65e44
SHA14c30f34b5ea6941e563e11b70a030741bd822e72
SHA25630440a9803baf77a8234b4a4f97599917dbbd35904795df427d49a28038356a5
SHA512946ae202472684408900f043130f65f5844a998f5675e71ad45b0d5c84a2d52d92d1748e8af741601768f93cd10ebc8e7b2de34593aaf95352991a5c00a96248
-
Filesize
308KB
MD5aedec8457f1481e8c36c1c86ea51fba5
SHA12f06d50c61f73ebafb6669aaf104dc85fcd5d61d
SHA256bb55038e9f30096df86cc941fefd96a801d69d4727c98936dac1b70dac52b9f2
SHA5128f9af594f06ae86099a0d2a1782b67a6f9bb85a4269256b9752af891ff1f740b9cbf484aaf86b046248e51208ceaf5b375834c9cb378bc1120916171f0f039ef
-
Filesize
308KB
MD5aedec8457f1481e8c36c1c86ea51fba5
SHA12f06d50c61f73ebafb6669aaf104dc85fcd5d61d
SHA256bb55038e9f30096df86cc941fefd96a801d69d4727c98936dac1b70dac52b9f2
SHA5128f9af594f06ae86099a0d2a1782b67a6f9bb85a4269256b9752af891ff1f740b9cbf484aaf86b046248e51208ceaf5b375834c9cb378bc1120916171f0f039ef
-
Filesize
366KB
MD5ca90fdcf9659bc1b9fe0b344a62d7d3c
SHA13702c35bdcee23de931566095fe1afbb6ccb943a
SHA25676f6af64cacea0bc3ee851e4d05fd63da747e3e7eb7ad4cb916b8cca9bbcf01c
SHA5122d6d572d314ecf12cc97f6f78dc7198cf64afbb0dcf486124975f5c9072daacd2f1745f168064d5335a787fc61b1731e12f9f7826d7ce3852596397a9a1c4ecb
-
Filesize
366KB
MD5ca90fdcf9659bc1b9fe0b344a62d7d3c
SHA13702c35bdcee23de931566095fe1afbb6ccb943a
SHA25676f6af64cacea0bc3ee851e4d05fd63da747e3e7eb7ad4cb916b8cca9bbcf01c
SHA5122d6d572d314ecf12cc97f6f78dc7198cf64afbb0dcf486124975f5c9072daacd2f1745f168064d5335a787fc61b1731e12f9f7826d7ce3852596397a9a1c4ecb